[Git][security-tracker-team/security-tracker][master] automatic update
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Feb 21 08:11:55 GMT 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
6589665c by security tracker role at 2024-02-21T08:11:42+00:00
automatic update
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -1,32 +1,164 @@
-CVE-2024-1676
+CVE-2024-26269 (Cross-site scripting (XSS) vulnerability in the Frontend JS module's p ...)
+ TODO: check
+CVE-2024-26266 (Multiple stored cross-site scripting (XSS) vulnerabilities in Liferay ...)
+ TODO: check
+CVE-2024-26140 (com.yetanalytics/lrs is the Yet Analytics Core LRS Library. Prior to v ...)
+ TODO: check
+CVE-2024-26136 (kedi ElectronCord is a bot management tool for Discord. Commit aaaeaf4 ...)
+ TODO: check
+CVE-2024-25905 (Cross-Site Request Forgery (CSRF) vulnerability in Mondula GmbH Multi ...)
+ TODO: check
+CVE-2024-25904 (Cross-Site Request Forgery (CSRF) vulnerability in David Stockl TinyMC ...)
+ TODO: check
+CVE-2024-25603 (Stored cross-site scripting (XSS) vulnerability in the Dynamic Data Ma ...)
+ TODO: check
+CVE-2024-25602 (Stored cross-site scripting (XSS) vulnerability in Users Admin module' ...)
+ TODO: check
+CVE-2024-25601 (Stored cross-site scripting (XSS) vulnerability in Expando module's ge ...)
+ TODO: check
+CVE-2024-25428 (SQL Injection vulnerability in MRCMS v3.1.2 allows attackers to run ar ...)
+ TODO: check
+CVE-2024-25152 (Stored cross-site scripting (XSS) vulnerability in Message Board widge ...)
+ TODO: check
+CVE-2024-25151 (The Calendar module in Liferay Portal 7.2.0 through 7.4.2, and older u ...)
+ TODO: check
+CVE-2024-25147 (Cross-site scripting (XSS) vulnerability in HtmlUtil.escapeJsLink in L ...)
+ TODO: check
+CVE-2024-25141 (When sslwas enabled for Mongo Hook, default settings included "allow_i ...)
+ TODO: check
+CVE-2024-24876 (Cross-Site Request Forgery (CSRF) vulnerability in Janis Elsts Admin M ...)
+ TODO: check
+CVE-2024-24872 (Cross-Site Request Forgery (CSRF) vulnerability in Themify Themify Bui ...)
+ TODO: check
+CVE-2024-24849 (Cross-Site Request Forgery (CSRF) vulnerability in Mark Stockton Quick ...)
+ TODO: check
+CVE-2024-24843 (Cross-Site Request Forgery (CSRF) vulnerability in PowerPack Addons fo ...)
+ TODO: check
+CVE-2024-24837 (Cross-Site Request Forgery (CSRF) vulnerability in Fr\xe9d\xe9ric GILL ...)
+ TODO: check
+CVE-2024-24802 (Cross-Site Request Forgery (CSRF) vulnerability in John Tendik JTRT Re ...)
+ TODO: check
+CVE-2024-24798 (Cross-Site Request Forgery (CSRF) vulnerability in SoniNow Team Debug. ...)
+ TODO: check
+CVE-2024-23830 (MantisBT is an open source issue tracker. Prior to version 2.26.1, an ...)
+ TODO: check
+CVE-2024-23758 (An issue discovered in Unisys Stealth 5.3.062.0 allows attackers to vi ...)
+ TODO: check
+CVE-2024-22235 (VMware Aria Operations contains a local privilege escalation vulnerabi ...)
+ TODO: check
+CVE-2024-1631 (Impact: The library offers a function to generate an ed25519 key pair ...)
+ TODO: check
+CVE-2024-1562 (The WooCommerce Google Sheet Connector plugin for WordPress is vulnera ...)
+ TODO: check
+CVE-2024-1501 (The Database Reset plugin for WordPress is vulnerable to Cross-Site Re ...)
+ TODO: check
+CVE-2024-1108 (The Plugin Groups plugin for WordPress is vulnerable to unauthorized m ...)
+ TODO: check
+CVE-2024-1081 (The 3D FlipBook \u2013 PDF Flipbook WordPress plugin for WordPress is ...)
+ TODO: check
+CVE-2024-0593 (The Simple Job Board plugin for WordPress is vulnerable to unauthorize ...)
+ TODO: check
+CVE-2023-52442 (In the Linux kernel, the following vulnerability has been resolved: k ...)
+ TODO: check
+CVE-2023-52441 (In the Linux kernel, the following vulnerability has been resolved: k ...)
+ TODO: check
+CVE-2023-52440 (In the Linux kernel, the following vulnerability has been resolved: k ...)
+ TODO: check
+CVE-2023-50923 (In QUIC in RFC 9000, the Latency Spin Bit specification (section 17.4) ...)
+ TODO: check
+CVE-2023-49034 (Cross Site Scripting (XSS) vulnerability in ProjeQtOr 11.0.2 allows a ...)
+ TODO: check
+CVE-2023-47422 (An access control issue in /usr/sbin/httpd in Tenda TX9 V1 V22.03.02.5 ...)
+ TODO: check
+CVE-2023-46967 (Cross Site Scripting vulnerability in the sanitize function in Enhance ...)
+ TODO: check
+CVE-2023-42953 (A permissions issue was addressed with additional restrictions. This i ...)
+ TODO: check
+CVE-2023-42952 (The issue was addressed with improved checks. This issue is fixed in i ...)
+ TODO: check
+CVE-2023-42951 (The issue was addressed with improved handling of caches. This issue i ...)
+ TODO: check
+CVE-2023-42946 (This issue was addressed with improved redaction of sensitive informat ...)
+ TODO: check
+CVE-2023-42945 (A permissions issue was addressed with additional restrictions. This i ...)
+ TODO: check
+CVE-2023-42942 (This issue was addressed with improved handling of symlinks. This issu ...)
+ TODO: check
+CVE-2023-42939 (A logic issue was addressed with improved checks. This issue is fixed ...)
+ TODO: check
+CVE-2023-42928 (The issue was addressed with improved bounds checks. This issue is fix ...)
+ TODO: check
+CVE-2023-42889 (The issue was addressed with improved checks. This issue is fixed in m ...)
+ TODO: check
+CVE-2023-42878 (A privacy issue was addressed with improved private data redaction for ...)
+ TODO: check
+CVE-2023-42877 (The issue was addressed with improved checks. This issue is fixed in m ...)
+ TODO: check
+CVE-2023-42873 (The issue was addressed with improved bounds checks. This issue is fix ...)
+ TODO: check
+CVE-2023-42860 (A permissions issue was addressed with additional restrictions. This i ...)
+ TODO: check
+CVE-2023-42859 (The issue was addressed with improved checks. This issue is fixed in m ...)
+ TODO: check
+CVE-2023-42858 (The issue was addressed with improved checks. This issue is fixed in m ...)
+ TODO: check
+CVE-2023-42855 (This issue was addressed with improved state management. This issue is ...)
+ TODO: check
+CVE-2023-42853 (A logic issue was addressed with improved checks. This issue is fixed ...)
+ TODO: check
+CVE-2023-42848 (The issue was addressed with improved bounds checks. This issue is fix ...)
+ TODO: check
+CVE-2023-42843 (An inconsistent user interface issue was addressed with improved state ...)
+ TODO: check
+CVE-2023-42840 (The issue was addressed with improved checks. This issue is fixed in m ...)
+ TODO: check
+CVE-2023-42839 (This issue was addressed with improved state management. This issue is ...)
+ TODO: check
+CVE-2023-42838 (An access issue was addressed with improvements to the sandbox. This i ...)
+ TODO: check
+CVE-2023-42836 (A logic issue was addressed with improved checks. This issue is fixed ...)
+ TODO: check
+CVE-2023-42835 (A logic issue was addressed with improved checks. This issue is fixed ...)
+ TODO: check
+CVE-2023-42834 (A privacy issue was addressed with improved handling of files. This is ...)
+ TODO: check
+CVE-2023-42823 (The issue was resolved by sanitizing logging This issue is fixed in wa ...)
+ TODO: check
+CVE-2023-42498 (Reflected cross-site scripting (XSS) vulnerability in the Language Ove ...)
+ TODO: check
+CVE-2023-42496 (Reflected cross-site scripting (XSS) vulnerability on the add assignee ...)
+ TODO: check
+CVE-2023-40191 (Reflected cross-site scripting (XSS) vulnerability in the instance set ...)
+ TODO: check
+CVE-2024-1676 (Inappropriate implementation in Navigation in Google Chrome prior to 1 ...)
- chromium <unfixed>
[bullseye] - chromium <end-of-life> (see #1061268)
[buster] - chromium <end-of-life> (see DSA 5046)
-CVE-2024-1675
+CVE-2024-1675 (Insufficient policy enforcement in Download in Google Chrome prior to ...)
- chromium <unfixed>
[bullseye] - chromium <end-of-life> (see #1061268)
[buster] - chromium <end-of-life> (see DSA 5046)
-CVE-2024-1674
+CVE-2024-1674 (Inappropriate implementation in Navigation in Google Chrome prior to 1 ...)
- chromium <unfixed>
[bullseye] - chromium <end-of-life> (see #1061268)
[buster] - chromium <end-of-life> (see DSA 5046)
-CVE-2024-1673
+CVE-2024-1673 (Use after free in Accessibility in Google Chrome prior to 122.0.6261.5 ...)
- chromium <unfixed>
[bullseye] - chromium <end-of-life> (see #1061268)
[buster] - chromium <end-of-life> (see DSA 5046)
-CVE-2024-1672
+CVE-2024-1672 (Inappropriate implementation in Content Security Policy in Google Chro ...)
- chromium <unfixed>
[bullseye] - chromium <end-of-life> (see #1061268)
[buster] - chromium <end-of-life> (see DSA 5046)
-CVE-2024-1671
+CVE-2024-1671 (Inappropriate implementation in Site Isolation in Google Chrome prior ...)
- chromium <unfixed>
[bullseye] - chromium <end-of-life> (see #1061268)
[buster] - chromium <end-of-life> (see DSA 5046)
-CVE-2024-1670
+CVE-2024-1670 (Use after free in Mojo in Google Chrome prior to 122.0.6261.57 allowed ...)
- chromium <unfixed>
[bullseye] - chromium <end-of-life> (see #1061268)
[buster] - chromium <end-of-life> (see DSA 5046)
-CVE-2024-1669
+CVE-2024-1669 (Out of bounds memory access in Blink in Google Chrome prior to 122.0.6 ...)
- chromium <unfixed>
[bullseye] - chromium <end-of-life> (see #1061268)
[buster] - chromium <end-of-life> (see DSA 5046)
@@ -93,10 +225,11 @@ CVE-2024-24793 (A use-after-free vulnerability exists in the DICOM Element Parsi
NOT-FOR-US: libdicom
CVE-2024-24763 (JumpServer is an open source bastion host and an operation and mainten ...)
NOT-FOR-US: JumpServer
-CVE-2024-24475 (An issue in Qemu before v.8.2.0 allows a remote attacker to execute ar ...)
+CVE-2024-24475
+ REJECTED
- qemu 1:8.2.0+ds-1
NOTE: https://github.com/qemu/qemu/commit/9d9c06b144da340b9a937ed01d45a936810715be (v8.2.0-rc0)
-CVE-2024-24474 (Buffer Overflow vulnerability in Qemu before v.8.2.0 allows a remote a ...)
+CVE-2024-24474 (QEMU before 8.2.0 has an integer underflow, and resultant buffer overf ...)
- qemu 1:8.2.0+ds-1
NOTE: https://gitlab.com/qemu-project/qemu/-/issues/1810
NOTE: https://github.com/qemu/qemu/commit/77668e4b9bca03a856c27ba899a2513ddf52bb52 (v8.2.0-rc0)
@@ -11032,7 +11165,7 @@ CVE-2023-6937 (wolfSSL prior to 5.6.6 did not check that messages in one (D)TLS
[bookworm] - wolfssl <no-dsa> (Minor issue)
[bullseye] - wolfssl <no-dsa> (Minor issue)
NOTE: https://github.com/wolfSSL/wolfssl/blob/v5.6.6-stable/ChangeLog.md#vulnerabilities
-CVE-2023-6936
+CVE-2023-6936 (In wolfSSL prior to 5.6.6, if callback functions are enabled (via the ...)
[experimental] - wolfssl 5.6.6-1
- wolfssl 5.6.6-1.2 (bug #1059357)
[bookworm] - wolfssl <no-dsa> (Minor issue)
@@ -203747,8 +203880,8 @@ CVE-2021-29052 (The Data Engine module in Liferay Portal 7.3.0 through 7.3.5, an
NOT-FOR-US: Liferay
CVE-2021-29051 (Cross-site scripting (XSS) vulnerability in the Asset module's Asset P ...)
NOT-FOR-US: Liferay
-CVE-2021-29050
- RESERVED
+CVE-2021-29050 (Cross-Site Request Forgery (CSRF) vulnerability in the terms of use pa ...)
+ TODO: check
CVE-2021-29049 (Cross-site scripting (XSS) vulnerability in the Portal Workflow module ...)
NOT-FOR-US: Liferay
CVE-2021-29048 (Cross-site scripting (XSS) vulnerability in the Layout module's page a ...)
@@ -203771,8 +203904,8 @@ CVE-2021-29040 (The JSON web services in Liferay Portal 7.3.4 and earlier, and L
NOT-FOR-US: Liferay
CVE-2021-29039 (Cross-site scripting (XSS) vulnerability in the Asset module's categor ...)
NOT-FOR-US: Liferay
-CVE-2021-29038
- RESERVED
+CVE-2021-29038 (Liferay Portal 7.2.0 through 7.3.5, and older unsupported versions, an ...)
+ TODO: check
CVE-2021-29037
RESERVED
CVE-2021-29036
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6589665c3f7c8f374a79e58a209540be1c08adf9
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/6589665c3f7c8f374a79e58a209540be1c08adf9
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240221/0f36fdb7/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list